-
981
Real-World Efficacy of Explainable Artificial Intelligence using the SAGE Framework and Scenario-Based Design
Published 2024-12-01“…The first of its kind, it leverages three distinct but complementary frameworks to support a user-centric and context-sensitive, post-hoc explanation for fraud detection. Using the principles of scenario-based design, it amalgamates two independent real-world sources to establish a realistic card fraud prediction scenario. …”
Get full text
Article -
982
Research on a traffic flow statistical algorithm based on YBOVDT and SAM2
Published 2025-05-01“…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
Get full text
Article -
983
Fine-grained access control method for private data in android system
Published 2019-03-01“…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
Get full text
Article -
984
Identification of key genes associated with mesocotyl length through a genome-wide association study in rice
Published 2025-05-01“…In this study, 300 rice germplasm resources with a wide range of sources were selected as experimental materials. …”
Get full text
Article -
985
Optimizing maize germination forecasts with random forest and data fusion techniques
Published 2024-11-01“…This study selected the Zheng Dan-958 maize variety to predict germination rates using multi-source information fusion and a random forest (RF) algorithm. …”
Get full text
Article -
986
Nurses’ usage of validated tools to assess for delirium in general acute care settings: A scoping review protocol [version 1; peer review: 2 approved]
Published 2025-02-01“…It often affects hospital in-patients and is associated with an increased risk of mortality, dementia, and functional decline. Delirium can be detected through the use of validated assessment tools, administered by nurses, and early detection is associated with improved outcomes for patients. …”
Get full text
Article -
987
Effective disinfecting of negative pressure pipelines of DCUs reduces the risk of cross infection in dental care
Published 2024-12-01“…Objectives Microbial contamination of various accessory parts of the dental chair units (DCUs) is an essential source of cross infection, while the accessories of the crucial suction function are usually overlooked. …”
Get full text
Article -
988
Characteristics of chemically induced liver progenitors derived from a pig model of metabolic dysfunction-associated steatotic liver disease.
Published 2024-01-01“…In contrast, markers of functional MH after re-differentiation were only detected in the healthy group. …”
Get full text
Article -
989
A lightweight transformer based multi task learning model with dynamic weight allocation for improved vulnerability prediction
Published 2025-08-01“…Traditional methods, such as single-task learning and ensemble approaches, often struggle with these challenges, particularly in detecting rare but critical vulnerabilities. To address this, we propose the MTLPT: Multi-Task Learning with Position Encoding and Lightweight Transformer for Vulnerability Prediction, a novel multi-task learning framework that leverages custom lightweight Transformer blocks and position encoding layers to effectively capture long-range dependencies and complex patterns in source code. …”
Get full text
Article -
990
Mid-infrared Ensemble Variability of Broad-line and Narrow-line Seyfert 1 Galaxies
Published 2025-01-01“…The MIR variability of the combined sample is positively correlated with black hole mass and the FWHM of the H β emission line at long rest-frame time lags. (4) The long-term MIR variability of the combined sample may be mainly driven by the Eddington ratio. (5) For BLSy1 galaxies, the MIR variability of radio-detected sources is greater than that of radio-undetected sources, whereas for NLSy1 galaxies, the opposite is true.…”
Get full text
Article -
991
The role of internal auditors in preventing financial fraud in the Republic of Serbia
Published 2023-01-01“…By exploring the practices and challenges faced by internal auditors, this paper aims to provide valuable insights and recommendations to strengthen the effectiveness of internal audit functions in detecting and preventing financial fraud. …”
Get full text
Article -
992
Retracted: Study on Modeling Method of Forest Tree Image Recognition Based on CCD and Theodolite
Published 2020-01-01“…Forest vegetation is the main body that constitutes forest resources. Accurate identification of the types of forest trees can lay the foundation for the research and utilization of forest resources. …”
Get full text
Article -
993
THE SOLUTION TO THE EQUATION OF THE SHOCK WAVE BURGERS IN THE PTC MATHCAD ENVIRONMENT
Published 2022-08-01“…However, this error is detected through the values of the nonlinear term included in the differential equation, which is determined according to the binomial representation through the quadratic forms of the matrix of the trial function. …”
Get full text
Article -
994
In-band network telemetry system based on high-performance packet processing architecture VPP
Published 2021-03-01“…An in-band network telemetry-based system was built based on VPP, a high-performance virtual network forwarding architecture/device, via reorganizing the data plane pipeline processing modules.Moreover, a network-wide telemetry mechanism was further developed via embedding source routing into the probe packet header for specifying the route of probe packets.Finally, a virtual network topology was built with performance evaluation conducted.The evaluation shows that the telemetry system can monitor the network in a high precision of every 0.13 ms, detecting link congestion in real time with minor performance overhead.Given virtual network devices have been widely deployed in data centers, the proposed scheme is expected to improve the reliability of multi-tenancy and network function virtualization in data centers via high-precision, network-wide virtual link telemetry coverage.…”
Get full text
Article -
995
Multiphysics Coupling Model of Rock Mass considering Damage and Disturbance and Its Application
Published 2018-01-01Get full text
Article -
996
Conditions for the emergence of circumnutations in plant roots.
Published 2021-01-01“…Here we describe a model capable of replicating root growth behaviors, which we used to analyze the role of circumnuntations, revealing their emergence I) under gravitropic stress, as a combination of signal propagation and sensitivity to the signal carriers; II) as a result of the interplay between gravitropic and thigmotropic responses; and III) as a behavioral strategy to detect and react to resource gradients. The latter function requires the presence of a hypothetical internal oscillator whose parameters are regulated by the perception of environmental resources.…”
Get full text
Article -
997
-
998
Balancing Performance and Portability: A Study on CsI(Tl) Crystal Sizes for Real-Time Gamma-Ray Spectrum and Dose Monitoring
Published 2024-07-01“…This was accomplished by calculating the detection efficiency and energy resolution through experimental measurements using standard gamma-ray sources and simulations using MCNP5. …”
Get full text
Article -
999
Egyptian pediatric kidney transplantation: highlights on post-transplant follow-up and management of complications by the Egyptian Pediatric Clinical Practice Guidelines Committee...
Published 2024-10-01“…Infections, rejection, recurrence, malignancy, bone problems, hypertension, and surgical complications are the most important challenges that require prevention, early detection, and management. Chronic allograft nephropathy needs different approaches based on its related causes, allograft pathology, graft function, and availability of re-transplantation. …”
Get full text
Article -
1000
Practical Implementation of a Smart Home Model Using Arduino and Sensors
Published 2025-05-01“…Controlling outdoor lighting based on ambient light intensity detected by a light sensor. Activating a security alarm by touch detection using a touch sensor. …”
Get full text
Article